Skip to main content

JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in Mobile Adhoc Network

  • Conference paper
  • First Online:
Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016 (IntelliSys 2016)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 16))

Included in the following conference series:

  • 2917 Accesses

Abstract

The demands of a higher degree of security level for the mobile ad-hoc network are yet to meet the best solution. Owing to the dynamic topology and decentralization issue, the mobile node suffers from a consistent security problem during communication stage. This paper has reviewed the existing system towards secure routing in mobile ad-hoc network and explored that there are still a lot of scopes to enhance the security level. This paper presents a non-cryptographic technique called as JIR2TA or Joint Invocation of Resource-based Thresholding and Trust-oriented Authentication using resource and trust factor to intensify the routing policies for strengthening the authentication process of a mobile node. The outcome of the study shows better packet delivery ratio, computational time, throughput, and end-to-end delay in contrast to existing secure routing technique.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Jin, M., Du, Z.: Management innovation and information technology. WIT Trans. Inf. Commun. Technol. 61, 2124 (2014)

    Google Scholar 

  2. Sarkar, S.: Wireless Sensor and Ad Hoc Networks under Diversified Network Scenarios. Artech House, Boston (2012)

    Google Scholar 

  3. Loo, J., Mauri, J., Ortiz, J.: Mobile Ad Hoc Networks: Current Status and Future Trends. CRC Press, Inc., Boca Raton (2012). p. 538

    Google Scholar 

  4. Kennington, J., Olinick, E., Rajan, D.: Wireless Network Design. Springer, New York (2011)

    Book  MATH  Google Scholar 

  5. Olanrewaju, R.F., Khan, B., Anwar, F., Shah, A.: Strategic profiling for behaviour visualization of malicious node in MANETs using Game Theory. J. Theor. Appl. Inf. Technol. 77(1), 25–43 (2015)

    Google Scholar 

  6. Amine, A., Ait Mohamed, O., Benatallah, B.: Network Security Technologies: Design and Applications. IGI Global, p. 330 (2013)

    Google Scholar 

  7. Pathan, A., Monowar, M., Fadlullah, Z.: Building Next-Generation Converged Networks: Theory and Practice. CRC Press, Boca Raton (2013)

    Book  Google Scholar 

  8. Pathan, A.: Security of self-organizing networks: MANET, WSN, WMN, VANET. Auerbach Pub., Boca Raton (2011)

    Google Scholar 

  9. Khan, B., Olanrewaju, R., Habaebi, M.: Malicious behaviour of node and its significant security techniques in MANET-A review. Aust. J. Basic Appl. Sci. 7(12), 286–293 (2013)

    Google Scholar 

  10. Khan, B., Olanrewaju, R., Mir, R., Adebayo, B.: Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach. Am. J. Comput. Sci. Eng. 2(3), 10–19 (2015)

    Google Scholar 

  11. Marimuthu, M., Krishnamurthi, I.: Enhanced OLSR for defense against DOS attack in ad hoc networks. J. Commun. Netw. 15(1), 31–37 (2013)

    Article  Google Scholar 

  12. Venkataraman, R., RamaRao, T., Pushpalatha, M.: Regression-based trust model for mobile ad hoc networks. IET Inf. Secur. 6(3), 131–140 (2012)

    Article  Google Scholar 

  13. Lv, X., Li, H.: Secure group communication with both confidentiality and non-repudiation for mobile ad-hoc networks. IET Inf. Secur. 7(2), 61–66 (2013)

    Article  Google Scholar 

  14. Zhang, P., Lin, C., Jiang, Y., Fan, Y., Shen, X.: A lightweight encryption scheme for network-coded mobile ad hoc networks. IEEE Trans. Parallel Distrib. Syst. 25(9), 2211–2221 (2014)

    Article  Google Scholar 

  15. Zhao, S., Aggarwal, A., Frost, R., Bai, X.: A survey of applications of identity-based cryptography in mobile ad-hoc networks. IEEE Commun. Surv. Tutorials 14(2), 380–400 (2012)

    Article  Google Scholar 

  16. Dhanapal, J., Srivatsa, S.: Link quality-based cache replacement technique in mobile ad hoc network. IET Inf. Secur. 7(4), 277–282 (2013)

    Article  Google Scholar 

  17. Xi, S., Liang, S., Jianfeng, M., Zhuo, M.: A trust management scheme based on behavior feedback for opportunistic networks. China Commun. 12(4), 117–129 (2015)

    Article  Google Scholar 

  18. Xia, H., Jia, Z., Li, X., Ju, L., Sha, E.: Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Netw. 11(7), 2096–2114 (2013)

    Article  Google Scholar 

  19. Tan, S., Li, X., Dong, Q.: Trust based routing mechanism for securing OSLR-based MANET. Ad Hoc Netw. 30, 84–98 (2015)

    Article  Google Scholar 

  20. Wan, Z., Ren, K., Gu, M.: USOR: An unobservable secure on-demand routing protocol for mobile ad hoc networks. IEEE Trans. Wireless Commun. 11(5), 1922–1932 (2012)

    Article  Google Scholar 

  21. Phu, P., Yi, M., Kim, M.: Securing AODV routing protocol in mobile ad-hoc networks. In: Active and Programmable Networks, vol. 4388, pp. 182–187. Springer, Heidelberg (2009)

    Google Scholar 

Download references

Acknowledgments

This work was partially supported by Ministry of Higher Education Malaysia (Kementerian Pendidikan Tinggi) under Research Initiative Grant Scheme (RIGS) number RIGS 16-357-0521.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Burhan Ul Islam Khan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Khan, B.U.I., Zulkurnain, N.F., Olanrewaju, R.F., Nissar, G., Baba, A.M., Lone, S.A. (2018). JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in Mobile Adhoc Network. In: Bi, Y., Kapoor, S., Bhatia, R. (eds) Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016. IntelliSys 2016. Lecture Notes in Networks and Systems, vol 16. Springer, Cham. https://doi.org/10.1007/978-3-319-56991-8_50

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-56991-8_50

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-56990-1

  • Online ISBN: 978-3-319-56991-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics